1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
12

Which of these is NOT an example of lifelong learning?

Computers and Technology
1 answer:
Sliva [168]3 years ago
5 0

Answer:

Having lunch with a friend

Explanation:

You might be interested in
​Five elements that can prove the genuineness of a user. What you know, what you have, what you are, what you do, and where you
nataly862011 [7]

Authentication factors are the factors that describe about the ingenuition or origination of the user. This is the tag that tells about the actuality of user that is getting connected with internet by the five elementals.

Hope this helps!

8 0
3 years ago
What does the term "technical skills" refer to and how do they help in the field of computers?
noname [10]
Technical skills is when you are advanced or know lots in Electronics. You are able to diagnose problems and fix them. They help in the computer field so much because they help fix everything if no one had these skills we wouldn’t be able to even use brainly
8 0
3 years ago
What is a segmentation?
lana66690 [7]

Answer:

Segmentation means to divide the marketplace into parts, or segments, which are definable, accessible, actionable, and profitable

3 0
2 years ago
PI
siniylev [52]

Explanation:

As the qn was copy pasted from another document...the qn seems incorrect... and incomplete..

pls see to it and attach the correct qn...

sorry

4 0
2 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Other questions:
  • In Microsoft Word, when you highlight existing text you want to replace, you are in what
    11·1 answer
  • Blank text has a darker apperance than normal texts
    8·1 answer
  • The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
    15·1 answer
  • The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po
    10·1 answer
  • How do you know if a remote host is alive or not?
    5·1 answer
  • Plz help meeeeee QUICKLY!!! WORTH 15 POINTS!
    15·1 answer
  • Think about some of the most memorable and forgettable games ever created. They can be games that were
    15·1 answer
  • Jonathan created a presentation for his workplace. He now wants to embed an audio file in the presentation. Which file format sh
    10·1 answer
  • What symbol do we use to denote a character?
    14·1 answer
  • Please help i only have 20 minuets
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!